Sciweavers

536 search results - page 7 / 108
» Embedding Information Security into the Organization
Sort
View
HICSS
2010
IEEE
139views Biometrics» more  HICSS 2010»
14 years 6 months ago
Quality and Fairness of an Information Security Policy As Antecedents of Employees' Security Engagement in the Workplace: An Emp
This paper investigates the impact of the characteristics of information security policy (ISP) on an employee's security compliance in the workplace. Two factors were propose...
Burcu Bulgurcu, Hasan Cavusoglu, Izak Benbasat
DAC
2007
ACM
15 years 10 months ago
Hardware Support for Secure Processing in Embedded Systems
The inherent limitations of embedded systems make them particularly vulnerable to attacks. We have developed a hardware monitor that operates in parallel to the embedded processor...
Shufu Mao, Tilman Wolf
BIS
2009
112views Business» more  BIS 2009»
14 years 7 months ago
Ontological Mapping of Information Security Best-Practice Guidelines
Abstract. Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more ...
Stefan Fenz, Thomas Pruckner, Arman Manutscheri
SEC
1997
14 years 10 months ago
A formal model to aid documenting and harmonizing of information security requirements
A formal top down model shall be presented to aid documentation and harmonization of information security requirements. The model formalizes layered development of inn security, w...
Jussipekka Leiwo, Yuliang Zheng
CODES
2005
IEEE
15 years 3 months ago
Power-smart system-on-chip architecture for embedded cryptosystems
In embedded cryptosystems, sensitive information can leak via timing, power, and electromagnetic channels. We introduce a novel power-smart system-on-chip architecture that provid...
Radu Muresan, Haleh Vahedi, Y. Zhanrong, Stefano G...